top of page

NSF SECURE Center
Research Security Briefing

Vol. 2, No. 8
March 6, 2026

The NSF SECURE Center distributes research security briefings and timely alerts via its listserv. The Briefing provides a centralized resource for research security-related information, including new statutory and research funding agency requirements, new or updated federal and community resources, and significant news items and scholarly works. The Center will also assess and provide commentary, interpretation, or implementation considerations on new requirements, notices and resources, working with higher education associations, legal partners, or agencies as needed.

Professional Association Resources & Reports

COGR February Virtual Meeting 2026 – Research Security Highlights

The COGR virtual meeting took place February 24-27, 2026.  Slide presentations and session recordings are available on the COGR website.  Note that you must be logged into the COGR Portal in order to view the recordings and recordings are available to registered attendees only.

COGR Session: Introduction to The NSF SECURE Center and Overview of Tools/Resources
 
Moderator: Kris West
Panelists:
 

  • Deepika Bhatia, Associate Vice President, Research Compliance and Regulatory Affairs, Emory University, and Director Southeast Region (NSF SECURE Center)

  • Amanda Humphrey, Chief Research Operations Officer, Northeastern University, and Co-Director, Northeast Region (NSF SECURE Center)

  • Lisa Nichols, Executive Director of Research Security, University of Notre Dame, and Deputy Director (NSF SECURE Center)

  • Lori Schultz, Assistant Vice President for Research, Colorado State University, and Deputy Director (NSF SECURE Center)

 
The panelists presented a detailed overview of the National Science Foundation (NSF) SECURE Center. The group discussed the background as a collaborative national initiative funded by the NSF to enhance research security across the U.S. research ecosystem, with particular duties as outlined by the CHIPS and Science Act and its mission to empower the research community to make security-informed decisions regarding research security concerns.  The panelists discussed how the NSF SECURE Center is achieving this mission by creating a shared virtual environment (SVE), disseminating best practices, developing frameworks for risk assessment, providing training, and facilitating information-sharing to address security challenges without stifling collaboration.  The NSF SECURE Center is engaging the broad community of individuals (including research security officers, researchers, and administrators) and entities (including institutions of higher education, non-profit research institutions, and small- and medium-size businesses) for input and feedback at all stages of its co-creation process.
 
The panelists then covered the Year One achievements of creating the NSF SECURE Center structure, establishing significant stakeholder engagement, initiating the development of the SVE, launching the Research Security Consolidated Training Module (CTM) and establishing the weekly Research Security Briefing.  In addition, product development of various toolkits, travel resources, terminology guides, and a risk assessment framework were initiated.  Year Two began with the launch of user-testing of the SVE to include increased resources, product development launch of toolkits and guides, refinement of risk assessment tools, and ongoing co-creation of solutions based on stakeholder needs.  Discovery activities continue with various stakeholder groups to understand hurdles and refine the resources needed to address security concerns.  The panelists highlighted the NSF SECURE Center communication and outreach opportunities, visible on the website, and encouraged participation.
 
COGR Session: Complying with DOJ’s Bulk Sensitive Data Rule
 
Moderator: Krystal Toups, COGR
Presenter: David Peloquin, Partner at Ropes & Gray
 
Federal agencies continue to issue rules and requirements regarding the sharing of sensitive data, including the Department of Justice (DOJ) Final Rule on bulk sensitive data regulations, carrying out Executive Order (E.O.) 14117, “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons,” which became effective in April 8, 2025, and the related NIH Policy on Enhancing Security Measures for Human Biospecimens (NOT-DO-25-160), effective October 24, 2025. Peloquin presented a current understanding of the DOJ Final Rule requirements, the intersection with agency-specific regulations, and their application in academic research environments.
 
The DOJ Final Rule on bulk sensitive data regulations are aimed at preventing individuals or entities, which are defined as, “covered persons” or a “country of concern” located in, or affiliated with, China (including Hong Kong and Macau), Russia, Venezuela, Iran, Cuba, and North Korea from accessing certain bulk sensitive personal data (e.g., personal health and human genomic data) relating to individuals in the U.S. or “U.S. persons”, including:
 

  • Any U.S. citizen, national or lawful permanent resident;

  • Any individual admitted to the U.S. as a refugee or granted asylum;

  • Any person located in the U.S. regardless of citizenship; or

  • Any entity organized solely under the laws of the U.S. or any jurisdiction within the U.S.
     

The DOJ Final Rule (“Final Rule”) is triggered by transactions involving a “US person” and a “country of concern” or “covered person.” The transactions must reach a certain threshold to be subject to the Rule. The regulations define six categories of U.S. sensitive personal data with defined thresholds:
 

These thresholds are measured for the preceding twelve months either through a single data transaction or aggregated transactions involving the same covered person. The regulation also applies to U.S. government-related data defined as (i) any precise geolocation data relating to a list of over 700 geofenced areas near government facilities, and (ii) sensitive personal data that is marketed as linkable to employees, contractors, or officials of the United States government. Peloquin noted that the Final Rule applies to U.S. sensitive personal data or U.S. government-related data even if it has been de-identified, anonymized, or encrypted.
 
An interesting insight is that “Covered Person” is also defined as an entity that is 50% or more owned, directly or indirectly, individually or in aggregate, by one or more countries of concern, or organized or chartered under the laws of, or has its principal place of business in a country of concern, or employees or contractors of such entities or resident in the territorial jurisdiction. Within this complex web, it is important to note that this definition would include U.S. and foreign subsidiaries with 50% or more ownership originating from a “country of concern”. “Covered person” also includes any person, wherever located, as determined by the Attorney General to a) have been or likely to become owned, controlled, subject to the jurisdiction or the direction of a “country of concern” or “covered person”, b) acted on behalf of a “country of concern” or “covered person”, or c) knowingly caused or directed a violation of the Final Rule.
 
The Final Rule prohibits U.S. persons from knowingly engaging in a covered data transaction involving data brokerage with a country of concern or covered person, where data brokerage is defined as the sale of data, licensing of access to data, or similar commercial transactions (those involving “payment or other valuable consideration”, which could potentially include a license to IP or structured data set, where the recipient did not collect or process the data directly from the individuals linked or linkable to the data. Peloquin further highlighted that transactions involving access by a “foreign person” (not a U.S. person) who is not a “covered person” must contractually restrict the foreign person from “on-ward streaming” the data, meaning prohibiting the foreign person from subsequently engaging in a covered data transaction involving data brokerage of the same data with a country of concern or foreign person.
 
Exchange of data for research purposes that does not involve money or “other valuable consideration” would not be considered commercial transactions. Other exemptions most relevant to higher education include data that is public at the time of the transaction and transactions that are conducted pursuant to U.S. federal government department and agency grants, contracts, or other agreements. Data transfers resulting from research, as part of licensing activities, will need additional scrutiny.
 
U.S. persons are prohibited from knowingly engaging in any covered data transaction with a “country of concern” or “covered person” that involves bulk U.S. sensitive personal data consisting of bulk human ‘omic data, or human biospecimens from which it could be derived. An exception is human biospecimens intended solely for use in diagnosing, treating, or preventing a disease or medical condition.
 
Peloquin noted that federal agencies can create their own policies which “sit aside” the Final Rule. For example,  the NIH policy on enhancing security measures for human biospecimens prohibits sharing of all biospecimens, including new cell lines unless commercially available, of U.S. persons (regardless of identifiability) which are collected, obtained, stored, used, or distributed using ongoing or new NIH funds with institutions or parties in “countries of concern” with the exception of three limited circumstances. These include: transactions authorized by federal law or international agreements or necessary to comply with law; in the rare circumstance where the facility or personnel in a country of concern possess needed capabilities or expertise not available elsewhere and use cannot be delayed; or at the request of the individual from whom the biospecimen was collected for the purposes of diagnosis, prevention, or treatment of that individual. Any such distribution must follow applicable export administration requirements as well. Documentation must be obtained if biospecimens are shared or distributed under these circumstances and provided to the NIH upon request.
 
Peloquin provided some case examples for licensing transactions which affect higher education institutions.  Additionally, the research community is reminded to use data transfer and use agreements when sharing data with any party and material transfer agreements as appropriate, including language prohibiting further, “onward” transmission of the shared data. Foreign ownership consideration is also applicable when submitting data to a public repository.
 
COGR Session: Unboxing Gifts, Monetary Donations, and Common Form Other Support
 
Moderator: Kris West, COGR
Presenters:
Megan Dietrich, Director, Client Advocacy and Education, Stanford University
Lindsey Spangler, Associate Dean, Research Integrity, Duke University
Derek Jones, Associate Director, Research Operations and IT Integrations, Duke University
 
In alignment with National Security Presidential Memorandum 33 (NSPM-33), many federal research funding agencies issued updated guidance on the disclosure of Current and Pending (Other) Support.  Typically, this guidance noted that researchers did not need to disclose “unrestricted gifts” as a form of Current and Pending (Other) Support.  However, following recommendations from a report issued by the Office of the Inspector General, National Institutes of Health (NIH) guidance now indicates that researchers must disclose “Monetary donations that support an investigator's research activities, that are given with an expectation.” The agency has also provided additional scenarios as examples when monetary donations need to be disclosed.  In addition, recent Department of Energy (DOE) Notice of Funding Opportunities (NOFOs) have included requirements that researchers disclose all gifts, with or without expectations.
As a result of these evolving requirements, recipient institutions are working to ensure that researchers and research administrators have access to sufficient data to make these disclosures, and to implement policies, processes, training, and communications to support the requirements.
 
Duke University has implemented a centralized system for Current and Pending (Other) Support reporting that integrates data from multiple sources including sponsored awards, proposed projects, in-kind resources, and outside interest disclosures, that allows researchers and research administrators to build researchers’ Current and Pending (Other) Support documentation.  Duke is working on including “monetary donations” as one of the data sources integrated within the tool.  The system also includes functionality to generate an XML file of the data that can be uploaded to SciENcv for reporting to federal agencies.
 
Stanford University has adopted a similar model, pulling together data from a variety of institutional sources into a single reporting tool.  While Stanford’s system does not generate XML for submission to SciENcv, it does provide researchers and administrators with the foundational information needed to complete Current and Pending (Other) Support.  In addition, Stanford has implemented two required training modules on disclosure, one of which focuses entirely on the process of completing disclosures (e.g., Other Support) using various institutional data sources.
 
Even with these advancements, challenges remain.  For example, questions have arisen concerning the correct means of reporting monetary donations to researchers that are designated for multiple purposes (e.g., a faculty member’s research, teaching, and service work).  In addition, questions remain regarding the appropriate mechanism for reporting “monetary donation” information to federal agencies, as the current SciENcv format does not readily support inclusion of this data.
 
COGR Session: Forthcoming Federal Research Security Program Requirements and FDP Cybersecurity Guidelines Demonstration
 
Moderator: Jennifer Ponting, Associate Vice President for Research Administration, University of Chicago.
Panelists: Jarret Cummings, Senior Advisor for Policy and Government Relations, EDUCAUSE, and Lisa Nichols, Executive Director of Research Security, University of Notre Dame
 
Cybersecurity is one of the “pillars” of research security programs (RSPs) that will be required by federal research funding agencies when they roll out RSP requirements in the near future to comply with (National Security Presidential Memorandum-33 (NSPM-33).  This session provided an update on the collaborative initiative led by the Federal Demonstration Partnership (FDP) and EDUCAUSE to develop practical research cybersecurity approaches tailored to the needs of federally funded research institutions. An overview of the project was provided, which brought together working groups of university, federal agency, and association representatives to identify emerging cybersecurity risks to fundamental research and to create “effective practices,” rather than prescriptive guidelines, that institutions can adapt within their research security programs. The effort included multiple stages of drafting and review, with input from dozens of universities, federal partners, and the broader research community before producing a final set of recommended practices.
The resulting framework will encourage institutions to develop a research cybersecurity plan outlining stakeholder roles, approaches to risk assessment and mitigation, and strategies for integrating the NSF Critical Controls Set, which includes measures such as phishing-resistant multi-factor authentication, endpoint protection, data backups, infrastructure inventories, and incident response planning. Importantly, the model will emphasize institutional discretion, allowing universities to determine how best to implement or adapt these controls within their research environments while documenting their rationale. The panelists noted the model framework is currently undergoing further review by federal representatives.

2026 Academic Security and Counter Exploitation (ASCE) Conference

Highlights from the 2026 Academic Security and Counter Exploitation (ASCE) Conference will be included in next week’s NSF SECURE Center Research Security Briefing.

Research Security News, Reports & Events

Please note, articles linked below may require a subscription to view.

NSF SECURE Center cannot distribute copies of subscription-based articles.

Charges Dismissed Against Three Scientists Charged in Worm Smuggling Scheme
(Associated Press, 2/25/2026)

The U.S. Department of Justice (DOJ) dropped charges against three Chinese scientists affiliated with the University of Michigan who were accused of helping a colleague smuggle biological materials from China into the United States for research purposes. The materials, mostly small, transparent laboratory worms, were ultimately determined not to pose a danger, though the case had initially been framed by U.S. officials as a national security concern. After the scientists spent more than three months in jail, the DOJ unexpectedly dropped the charges and the researchers returned to China. Defense attorneys said the dismissal followed intervention by China’s consulate in Chicago and emphasized that the scientists lacked malicious intent, while federal officials declined to comment on the circumstances behind the decision. (more)

European Commission creates new push for science diplomacy and research security
(Open Access Government, 3/4/2026)

The European Commission has introduced a new set of initiatives aimed at strengthening both science diplomacy and research security across the European Union. Central to the effort is a proposed EU framework for science diplomacy that would help Member States coordinate international research engagement more strategically.  The initiative is intended to enhance Europe’s competitiveness, promote democratic values, and support cooperation on global challenges while safeguarding strategic interests.  Alongside the proposal, the Commission released the Research Security Monitor 2025, which provides a baseline assessment of research security policies across the EU and highlights the growing awareness of risks associated with international research collaboration. The measures are part of a broader push to maintain open scientific cooperation while strengthening safeguards and ensuring that Europe remains an attractive and secure partner for global research and innovation. (more)

New HE foreign funding portal beset by critical data gaps
(University World News, 2/20/2026)

A new U.S. Department of Education foreign funding disclosure portal, intended to increase transparency about international donations and contracts, may be undermined by significant gaps in the data it provides. According to accounting expert Michael Bass, the portal, introduced in 2020 to report foreign gifts and contracts under Section 117 of the Higher Education Act, no longer provides key information that had been included in earlier reporting systems, such as names of foreign entities, the purpose of the funding, and transaction dates. As a result, Bass argues it has become difficult to determine the true sources or intended uses of foreign funding, even as reported totals continue to grow. The Department of Education recently reported that U.S. institutions received $5.2 billion in reportable gifts and contracts in 2025, contributing to a cumulative total of $67.6 billion since 1986.
 

Bass contends that the lack of identifying information and dates makes meaningful analysis of the data nearly impossible and limits the ability to monitor potential foreign influence. He notes that billions of dollars reported through the portal since 2020 cannot be easily traced, and that inconsistencies and unexplained changes in previously reported figures further complicate the data. For example, totals attributed to some countries and universities appear to decline between reports without explanation, and some institutions that previously appeared in the database no longer do. While the Department of Education has described the portal as providing “unprecedented visibility” into foreign funding in higher education, critics argue that the missing data elements significantly reduce its usefulness for transparency, oversight, and research security analysis.

Registration Open for May 2026 In-Person FDP Meeting

Registration is now open for the in-person May 2026 Federal Demonstration Partnership (FDP) meeting at the Mayflower Hotel in Washington, DC.  The meeting starts on Wednesday, May 27th, and concludes approximately noon Friday, May 29th.  Information regarding research security-related sessions will be provided as agenda details become available.

Texas A&M University’s Research and Innovation Security and Competitiveness (RISC) Institute disseminates weekly RISC Media Bulletins, covering topics related to research security, foreign influence, and the intersection of science, technology, and national security.  To join the distribution list for the RISC Bulletin or view previous editions, click here.

RISC Bulletin

NSF SECURE Opportunities, Updates & Resources

Research  Security 101 Webinar Recording Now Available

A recording is now available of the February 17, 2026, NSF SECURE Center webinar, “Research Security 101: From ‘Foreign Influence’ to the CHIPS and Science Act.” The session, led by Lori Schultz, Co-Director of the NSF SECURE Center Southwest Region and Assistant Vice President for Research Administration at Colorado State University, covered foreign influence/research security in the context of higher education institutions, from universities first learning about the issue through today, including the DOJ China Initiative, NSPM-33 and the definition of research security programs, and the CHIPS and Science Act.

Each week the NSF SECURE Center hosts events through the National and Regional Centers, including co-creation workshops, educational, and engagement sessions with the research community. The events calendar provides more information about these opportunities and more.

NSF SECURE Center Calendar of Events

Previous NSF SECURE Center Research Security Briefings

2026 issues of the Research Security Briefing are available on the NSF SECURE Center website.

A combined, searchable version of all 2025 issues of the Briefing is also available.

Looking to participate in NSF SECURE Center co-creation activities or contribute to weekly briefings?

Contact info@secure-center.org or sign up here.

The information provided by the NSF SECURE Center is intended for general research and educational purposes only. While we strive to ensure the accuracy and reliability of our content, we do not guarantee its completeness, timeliness, or applicability to specific circumstances. Each user is responsible for conducting their own risk assessments and making decisions based on independent judgment.

 

Further, the NSF SECURE Center does not provide professional or legal advice, and users are encouraged to consult qualified professionals before making decisions based on the information found here. The NSF SECURE Center shall not be liable for any damages or costs of any type arising out of or in any way connected with your use of this information. External links are provided for convenience and do not constitute an endorsement of the content or services offered by any third-party resources.

 

This material is based upon work supported by the U.S. National Science Foundation under Cooperative Agreement No. 2403771.  Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the U.S. National Science Foundation or other U.S. Government Agencies.

bottom of page